2. SCQF level: Choose 3. SCQF credit value ECTS credit value: 10

Size: px
Start display at page:

Download "2. SCQF level: Choose 3. SCQF credit value ECTS credit value: 10"

Transcription

1 Module Descriptor Part one: Module leader s section: core module details 1. Module title: Network Security and Cryptography 2. SCQF level: Choose 3. SCQF credit value ECTS credit value: Module code CSN09xxx 6. Module leader: Prof. Bill Buchanan 7. School: Computing 8. Napier subject area: Computer Systems (CSY) 9. Prerequisites To study this modules you will need the learning equivalent to the module listed or to have passed this module Module code CSN08102 Module title Practical Networks 2 Examples of equivalent learning Level 8 equivalent networking-related module or module in software development. 10. What you will learn and what this module is about Security is a major concern in technological developments and in business development. This module provides a deep understanding of some key fundamental areas of security, and aims to provide a foundation of the key principles and practiced used in network security and in cryptography. The module uses an advanced cloud infrastructure to virtualize the labs, using both public clouds (including Amazon EC2 and Azure) along with a private cloud. It also has full on-line lectures and a range of related challenges. The main focuses is on: - Network security architectures and devices. - Codes and code cracking. - Network protocols. The module uses an advanced website ( which outlines a wide range of security principles, and provides ever-changing on-line challenges. Overall the module presents material to computing-related students, no matter their future intentions, background, or programme, and aims to provide fundamental areas of security in a fun and interesting way. 11. Description of module content The aim of the module is to develop a deep understanding network security and cryptography, that will allow graduates to act professionally in the design, analysis, implementation, and reporting related to network security. An outline of the main areas includes: - Network Architectures and Network Device Configuration. Robust, scaleable and secure architectures. Firewalls/IDS/IPS/Log/DMZ Configuration. - Hosts, servers and services. Configuration of the range of hosts, services and servers used in network architectures, including covering related test/debug tools. Intrusion Detection Systems. Techniques, Snort, IDS Rules, Distributed/Agent-based, Signature/Anomaly detection, APT, and signature generation. - Cloud/grid computing. Principles, virtualisation, distributed architectures, dynamic infrastructures, and layered approaches. - Introduction to Network Protocols/Forensics. - Secret Codes. Substitution codes, key-based codes, secret sharing, and a wide range of methods. - Encryption. Prime Numbers, Weaknesses, Public/private key, CBC/ECB. Coverage of methods: RSA, AES, ElGamal, and so on. - Key exchange methods. Diffie-Hellman, Kerberos, and so on. - Hashing methods. Including MD5, SHA-1, and so on. Adding Salt. Collisions, One-time passwords. - Authentication methods. Authentication methods, Identity Architectures, Digital Certificates. 1

2 - Data Integrity. Checksums, Message Authentication Codes (MACs), CRC-32, and other associated methods. - Code cracking methods. Brute force, rainbow methods, parallel processing, Man-in-the-middle, known weaknesses. 12. Learning Outcomes for module On completion of this module, students will be able to: L1: Develop an advanced knowledge of key security/cryptography principles and methods. L2: Understand the key academic principles and practical skills required to build security architectures. L3: Design, implement, evaluate and critically analyse a system to a given set of security requirements 13. Indicative References and Reading List T1: Buchanan WJ, Security and Network Forensics, Auerbach Publishers Inc., 2009, ISBN X. T2: Buchanan WJ, Advanced Cloud and Virtualisation, CRC Press, Sept 2014, ISBN T3: asecuritysite.com Part two: Module leader s section: Versions 14. Occurrence: 14a. Primary mode of delivery: Blended 14b. Location of delivery: Scotland Partner: N/A Napier Delivery Other partner (if more than one using same version): 14c. Member of staff with primary responsibility for delivering module, if different from module leader: 15. WebCT presence Please select one: 1. This version of the module does not require a WebCT presence. 2. This version of the module requires a WebCT presence that is not shared with any other versions. 3. This version of the module requires a WebCT presence that is shared with other versions (give details): 16. LTA approach Learning & teaching methods including their alignment to LOs The coursework will involve the design, implementation, evaluation and critical analysis of a system to a given set of security requirements [L3]. The module will use an advanced cloud infrastructure which virtualises hosts and devices, and allows complex network architectures to be created. The Asecuritysite Web package contains a completely managed learning environment, where the students can track their performance. Embedding of employability/ PDP/ scholarship skills The module uses industry-standard methods, protocols, equipment and software. Assessment (formative and summative) There will be two methods of assessment: Coursework [5]. This relates to a coursework on the design, implementation, evaluation and critical analysis of a prototype of a secure/digital forensics system, based on a range of requirements. On-line tests [5]: This involves two on-line tests which cover the key areas of network security and cryptography. Research/ teaching linkages The main research group involved in this area has an excellent foundation in research related to security and digital forensics (Centre for Distributed Computing and Security). It has several researchers working in this area, including on the performance evaluation of security devices, enhanced digital forensic frameworks, and in e-crime. The group also has patents related to next-generation digital forensic system, and works with many industrial companies on security and digital forensics. There are also links with the different domains 2

3 such as with the NHS, the Scottish Police, the FSA, and other industrial partners. The module also uses a state-of-the-art teaching framework, which has been published in educational journals and conferences (Buchanan, 2006). Ref: Buchanan WJ, Correlation between academic and skills-based tests in computer networks, British Journal of Educational Technology, -. doi: /j x, Vol 37, No 1, 2006, pp Supporting equality and diversity The technology can be used by any student, and there are no barriers to equality or diversity. The material will be available in a wide range of formats, including a printed version, and an electronic version. All the lectures will be available on-line, and a narrative of the material covered in the lecture. and MSN Messenger support is also available to allow remote working. Student can work at their own pace through the Asecuritysite Web infrastructure, and gain formative feedback on their performance. Internationalisation The module uses equipment, techniques, technologies, and methodologies that are standard across the World. Security is also a major issue around the World, and students should be able to understand how a secure system can span across large-areas, and over different countries and continents. 17. Student Activity (NESH) L&T activity NESH Face-to-face Lecture 24 Face-to-face Practicals/Labs 24 Independent learning Individual learning activities 152 TOTAL NESH = 200 hours 18. Assessment Week Type of assessment Weighting LOs covered Length/ volume Component: Assessment One Enter assessment element(s): 8,12 Digital exam 5 1,2 2 hours 14 Project hours Component subtotal: 10 Component: Assessment Two Enter assessment element(s): Component subtotal: Module total: 10 3

4 19. Length of module delivery. Over how many trimesters is this module delivered? One Two Three See Guidance Note Trimester(s) of delivery. TR2 Admin use 21. Approval Date of approval Date of approval commencement Final date of review 22. External examiner s name 23. Main Administrator s name Fiona Sutherland, Assistant Faculty Manager, School of Computing 24. Notes for administrative use only Admin use (for each version) 24. Exemptions awarded from regulations 4

5 5

SUMMARY OF INFORMATION ON EACH COURSE

SUMMARY OF INFORMATION ON EACH COURSE 1. Name of Course Applied Cryptography 2. Course Code TAC 3121 3. Status of Course Specialisation Core for B.IT Security Technology [Applies to (cohort) ] 4. MQF Level/Stage Note : Certificate MQF Level

More information

SQA Advanced Unit specification: general information for centres

SQA Advanced Unit specification: general information for centres SQA Advanced Unit specification: general information for centres Unit title: Cloud Computing Unit code: HP1Y 47 Superclass: CE Publication date: August 2017 Source: Scottish Qualifications Authority Version:

More information

Module Definition Form (MDF)

Module Definition Form (MDF) Module Definition Form (MDF) Module code: MOD005618 Version: 1 Date Amended: 25/Nov/2016 1. Module Title Object Orientated Modelling and Data Design 2a. Module Leader Peter Sun 2b. Department Department

More information

Wireless LANs (CO72047)

Wireless LANs (CO72047) W.Buchanan (1) (c) buchanan Teaching Team W.Buchanan (2) Dr WJ Buchanan, Module Leader, Reader. Group Leader, DSMA (Dist. Sys. and Mobile Agents) Dr Imed Romdhani, Lecturer. Specialist in Wireless and

More information

Programme Specification

Programme Specification Programme Specification BSc Honours Forensic Computing 1. Awarding institution Middlesex University 2. Teaching institution Middlesex University 3. Programme accredited by 4. Final qualification BSc Honours

More information

School of Engineering and the Built Environment Glasgow Caledonian University

School of Engineering and the Built Environment Glasgow Caledonian University School of Engineering and the Built Environment Glasgow Caledonian University MSc Advanced Computer Networking Programme Specification Document Session 2015-16 Programme Specification Pro-forma (PSP) 1.

More information

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science School of Electrical Engineering and Computer Science Programme Specification Faculty of Engineering and Informatics Programme title: BSc (Hons) Computer Science for Business Academic Year: 2017/18 Degree

More information

(FHEQ) level 6] 3 years full-time; 4 years full-time including a year of study abroad and/or work placement. I301 (4-years) Computing, Engineering

(FHEQ) level 6] 3 years full-time; 4 years full-time including a year of study abroad and/or work placement. I301 (4-years) Computing, Engineering Faculty of Engineering and Informatics Programme Specification Programme title: BEng (Hons) Software Engineering Academic Year: 2018/19 Degree Awarding Body: Partner(s), delivery organisation or support

More information

MASTER OF SCIENCE IN COMPUTER SCIENCE

MASTER OF SCIENCE IN COMPUTER SCIENCE THE UNIVERSITY OF ZAMBIA SCHOOL OF NATURAL SCIENCES DEPARTMENT OF COMPUTER STUDIES MASTER OF SCIENCE IN COMPUTER SCIENCE November 2014 1) BACKGROUND From the inception of Computer Science programmes at

More information

Programme Specification

Programme Specification Programme Specification Awarding Body/Institution Teaching Institution Queen Mary University of London Queen Mary University of London Name of Final Award and Programme Title Certificate in Intellectual

More information

School of Engineering and Built Environment. MSc/PgD Big Data Technologies. Programme Specification

School of Engineering and Built Environment. MSc/PgD Big Data Technologies. Programme Specification School of Engineering and Built Environment MSc/PgD Big Data Technologies Programme Specification 10 th May 2016 PROGRAMME SPECIFICATION PRO-FORMA - POSTGRADUATE 1 General Information 1. Programme Title:

More information

MSc Management with Project Management. BS524 (with PDP) Postgraduate Diploma in Management. January 2016 January 2021.

MSc Management with Project Management. BS524 (with PDP) Postgraduate Diploma in Management. January 2016 January 2021. PROGRAMME APPROVAL RECORD AND CERTIFICATE (PARC) PART 1 - GENERAL INFORMATION Programme title Award title Awarding Body/Institution Teaching Institution (if different) Language of Study UCAS Code Programme

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on

More information

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science. Academic Year: 2017/18

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science. Academic Year: 2017/18 School of Electrical Engineering and Computer Science Programme Specification Faculty of Engineering and Informatics Programme title: BSc (Hons) Computer Science Academic Year: 2017/18 Degree Awarding

More information

Programme Specification. MSc Telecommunications Engineering 2016/17

Programme Specification. MSc Telecommunications Engineering 2016/17 School of Engineering and the Built Environment Glasgow Caledonian University Programme Specification MSc Telecommunications Engineering 2016/17 1 Programme Specification Pro-forma 1. GENERAL INFORMATION

More information

Study Abroad Programme

Study Abroad Programme MODULE SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS Module name Module code School Department or equivalent Networks and Operating Systems IN2011 Mathematics, Computer Science and Engineering Department

More information

Course Specifications M. Tech. / PG Diploma Programme

Course Specifications M. Tech. / PG Diploma Programme Course Specifications M. Tech. / PG Diploma Programme Faculty of Engineering & Technology M. S. Ramaiah University of Applied Sciences University House, New BEL Road, MSR Nagar, Bengaluru 560 054 www.msruas.ac.in

More information

STUDENT AND ACADEMIC SERVICES

STUDENT AND ACADEMIC SERVICES PROGRAMME SPECIFICATION Part 1: Information Awarding Institution Teaching Institution Delivery Location Study abroad / Exchange / Credit recognition Faculty responsible for programme Department responsible

More information

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level

More information

BS523 (with PDP) Postgraduate Diploma in Management. January 2016 January September 2017

BS523 (with PDP) Postgraduate Diploma in Management. January 2016 January September 2017 PROGRAMME APPROVAL RECORD AND CERTIFICATE (PARC) PART 1 - GENERAL INFORMATION Programme title Award title Awarding Body/Institution Teaching Institution (if different) Language of Study UCAS Code Programme

More information

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020. PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Bachelor of Science with Honours (SW) (Fnd) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool

More information

Module Documentation

Module Documentation Module Documentation COMP08025 Information Systems Development Contents of this document are copyright of Galway Mayo Institute of Technology Page 1 of 5 COMP08025 Information Systems Development Short

More information

Full-Time: 4 Years, Sandwich Thick: 5 Years All LJMU programmes are delivered and assessed in English

Full-Time: 4 Years, Sandwich Thick: 5 Years All LJMU programmes are delivered and assessed in English PROGRAMME SPECIFICATION Bachelor of Science with Honours (SW) (Fnd) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool

More information

Unit title: Internet and Network Technology Fundamentals

Unit title: Internet and Network Technology Fundamentals Higher National Unit specification General information for centres Unit code: F204 34 Unit purpose: This Unit is designed to introduce candidates to the knowledge and understanding of services, theoretical

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Security Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

MSc Computer Networking

MSc Computer Networking School of Business Informatics and Software Engineering MSc Computer Networking PROGRAMME DOCUMENT VERSION 2.0 MCN v2.0 July 2008 University of Technology, Mauritius La Tour Koenig, Pointe aux Sables,

More information

Academic Course Description

Academic Course Description BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography

More information

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Unit 46: Network Security Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Aim To provide learners with opportunities to manage, support and implement a secure network infrastructure

More information

Programme title: BSc (Hons) Forensic Archaeology and Anthropology

Programme title: BSc (Hons) Forensic Archaeology and Anthropology Faculty of Life Sciences Programme Specification Programme title: BSc (Hons) Forensic Archaeology and Anthropology Academic Year: 2017-18 Degree Awarding Body: Partner(s), delivery organisation or support

More information

Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) 2009/2010

Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) 2009/2010 Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) 2009/2010 s / F2V0-ITS Information Technology (Software Engineering) 6. Course Accredited by 7. QAA

More information

CSC 774 Network Security

CSC 774 Network Security CSC 774 Network Security Topic 2. Review of Cryptographic Techniques CSC 774 Dr. Peng Ning 1 Outline Encryption/Decryption Digital signatures Hash functions Pseudo random functions Key exchange/agreement/distribution

More information

SQA Advanced Unit specification. General information. Network Server Operating Systems. Unit code: HP2W 48. Unit purpose

SQA Advanced Unit specification. General information. Network Server Operating Systems. Unit code: HP2W 48. Unit purpose SQA Advanced Unit specification General information Unit title: Network Server Operating Systems Unit code: HP2W 48 Superclass: CB Publication date: August 2017 Source: Scottish Qualifications Authority

More information

IBM Skills Academy. For <<Academy>> Career-based Education

IBM Skills Academy. For <<Academy>> Career-based Education IBM Skills Academy Providing students with a career-oriented training program on emerging technologies such as Mobile Computing, Cybersecurity, Business Analytics, Big Data, Cloud Computing, Cognitive

More information

Cyber Security School

Cyber Security School Cyber Cyber Security School FUTURE PROOF Y SECURITY TALENT "The UK needs to tackle the systemic issues at the heart of the Cyber skills shortage..." National Cyber Security Strategy 2016-2021, HM Government

More information

N/A. Engineering (MEng) July 2014

N/A. Engineering (MEng) July 2014 Faculty of Engineering & Informatics School of Engineering Programme Specification Programme title: MSc Mechanical Engineering Academic Year: 2017/2018 Degree Awarding Body: Partner(s), delivery organisation

More information

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program. ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Technology Informatiio on Technology PhD Program IT PH.D. Program Page 0 Assiut University Faculty of Computers & Informationn

More information

Microsoft Certified Solutions Associate 2012

Microsoft Certified Solutions Associate 2012 Microsoft Certified Solutions Associate 2012 IT Professional Training Table of Contents Introduction... 3 Class Schedule... 3 Learning & Teaching Methods... 3 Courses Covered... 3 Course Outline... 4 1)

More information

University of Moratuwa

University of Moratuwa University of Moratuwa Faculty of Information Technology Bachelor of Information Technology (BIT) External Degree Programme Administered by the Centre for Open & Distance Learning (CODL) Mode 01 Collaboration

More information

SQA Advanced Unit specification: general information. Professionalism and Ethics in Computing

SQA Advanced Unit specification: general information. Professionalism and Ethics in Computing SQA Advanced Unit specification: general information Unit title: Professionalism and Ethics in Computing Unit code: HP29 47 Superclass: DE Publication date: August 2017 Source: Scottish Qualifications

More information

Expected start dates September Placements 30 weeks, optional Partnership model Not applicable

Expected start dates September Placements 30 weeks, optional Partnership model Not applicable KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level

More information

Quality Code for Higher Education. Application for Validation Part 1: Programme/Stage Specification Pro Forma

Quality Code for Higher Education. Application for Validation Part 1: Programme/Stage Specification Pro Forma Quality Code for Higher Education Application for Validation Part 1: Programme/Stage Specification Pro Forma INTRODUCTION Identifiers (e.g. a, b, c etc) should be used throughout this document to indicate

More information

MSc Enterprise Security & Digital Forensics

MSc Enterprise Security & Digital Forensics School of Innovative Technologies & Engineering Department of Business Informatics & Software Engineering MSc Enterprise & Digital Forensics PROGRAMME DOCUMENT Version 1.0 MESDF v1.0 April 2012 University

More information

Course Syllabus: CompTIA Network+

Course Syllabus: CompTIA Network+ Course Syllabus: CompTIA Network+ Instructor: Roger Elliott Email: relliott@c-tec.edu Phone: Office: (740) 364-2299 Cell (740) 814-7504 Courseware Course #: Hours: TestOut Network Pro 4.1 CompTIA Network+

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Bachelor of Science with Honours (SW) (Fnd) in Computer Science Awarding institution Teaching institution UCAS Code JACS Code Liverpool John Moores University LJMU Programme Duration

More information

A candidate is encouraged to use the internet in any research, etc. However, the evidence produced must be the candidate s own written words.

A candidate is encouraged to use the internet in any research, etc. However, the evidence produced must be the candidate s own written words. Higher National Unit Specification General information for centres Unit code: DV6G 34 Unit purpose: The Unit will introduce the candidate to the steps necessary to undertake secure commercial transactions

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Telecommunications and Networks Award MSc School School of Engineering and Mathematical Sciences Department or equivalent School

More information

SYLLABUS. DIGITAL FORENSICS WITH EnCase 7 FORENSICS. Module 1: Basic course Module 2: Automation using EnScript Module 3: Advanced course

SYLLABUS. DIGITAL FORENSICS WITH EnCase 7 FORENSICS. Module 1: Basic course Module 2: Automation using EnScript Module 3: Advanced course SYLLABUS DIGITAL FORENSICS WITH EnCase 7 FORENSICS Module 1: Basic course Module 2: Automation using EnScript Module 3: Advanced course Approved by the Principal of the Norwegian Police University College

More information

Software Reliability and Reusability CS614

Software Reliability and Reusability CS614 Software Reliability and Reusability CS614 Assiut University Faculty of Computers & Information Quality Assurance Unit Software Reliability and Reusability Course Specifications2011-2012 Relevant program

More information

CSC/ECE 774 Advanced Network Security

CSC/ECE 774 Advanced Network Security Computer Science CSC/ECE 774 Advanced Network Security Topic 2. Network Security Primitives CSC/ECE 774 Dr. Peng Ning 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange;

More information

Syllabus: The syllabus is broadly structured as follows:

Syllabus: The syllabus is broadly structured as follows: Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data

More information

PROGRAMME SUMMARY You are required to take eight core modules in terms one and two as outlined in the module list.

PROGRAMME SUMMARY You are required to take eight core modules in terms one and two as outlined in the module list. PROGRAMME SPECIFICATION MSc Real Estate Investment KEY FACTS Programme name Real Estate Investment Award MSc School Cass Business School Department or equivalent Specialist Masters Programme Programme

More information

Prof. Bill Buchanan Room: C.63

Prof. Bill Buchanan Room: C.63 Wireless LAN CO72047 Introduction Prof. Bill Buchanan Contact: w.buchanan@napier.ac.uk Room: C.63 Telephone: X2759 MSN Messenger: w_j_buchanan@hotmail.com WWW: http://www.dcs.napier.ac.uk/~bill http://buchananweb.co.uk

More information

UNIT OUTLINE. Network Engineering 304. Mr Iain Murray. Department of Electrical and Computer Engineering Curtin Engineering

UNIT OUTLINE. Network Engineering 304. Mr Iain Murray. Department of Electrical and Computer Engineering Curtin Engineering 305682 Network Engineering 304 Mr Iain Murray Department of Electrical and Computer Engineering Curtin Engineering UNIT OUTLINE Semester 2 2009 CRICOS (Perth - 00301J) (Sydney - 02637B) Table of Contents

More information

Networks and Communications MS216 - Course Outline -

Networks and Communications MS216 - Course Outline - Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the

More information

Study Programme Description

Study Programme Description Study Programme Description Title of the study Software Engineering Official name of the institution, faculty (s) Vilnius University, Faculty of Mathematics and Informatics, Department of Software Engineering

More information

UNDERGRADUATE PROGRAMME SPECIFICATION

UNDERGRADUATE PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: BSc (Hons) Computer Networks (progression award) Staffordshire University Faculty of Computing,

More information

CIBTAC LEVEL 3 CERTIFICATE IN MEDIA MAKE-UP CMC02 QAN 603/2350/4. Qualification Specification

CIBTAC LEVEL 3 CERTIFICATE IN MEDIA MAKE-UP CMC02 QAN 603/2350/4. Qualification Specification CIBTAC LEVEL 3 CERTIFICATE IN MEDIA MAKE-UP CMC02 QAN 603/2350/4 Qualification Specification CONTENTS 1. CIBTAC... 3 2. Introduction to CIBTAC qualifications... 3 3. Level of the CIBTAC Level 3 Certificate

More information

MODULE SPECIFICATIONS

MODULE SPECIFICATIONS S 1. Title of the module Leading Assurance Engagements PRSN7106 2. School or partner institution which will be responsible for management of the module 3. The level of the module (e.g. Level 4, Level 5,

More information

The Scottish Credit and Qualifications Framework and Chartered Banker Institute

The Scottish Credit and Qualifications Framework and Chartered Banker Institute The Scottish Credit and Qualifications Framework and Chartered Banker Institute Working together for Life Long Learning: SCQF and Chartered Banker Institute Lydia George, Development Officer, SCQFP Colin

More information

SECURITY SYSTEMS TECHNICIAN

SECURITY SYSTEMS TECHNICIAN SECURITY SYSTEMS TECHNICIAN Occupation Description System means a person who designs, installs, repairs, maintains, replaces, tests, services the operation of all electronic security systems in accordance

More information

Kurose & Ross, Chapters (5 th ed.)

Kurose & Ross, Chapters (5 th ed.) Kurose & Ross, Chapters 8.2-8.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) Addison-Wesley, April 2009. Copyright 1996-2010, J.F Kurose and

More information

Security and Forensic Computing

Security and Forensic Computing Security and Forensic Computing Module Specification 1 OUTLINE DETAILS 9 MODULE DEFINITION 10 ASSESSMENT SPECIFICATION 17 Details 17 Coursework Assignment 17 Outline Requirements 17 Marking schedule 17

More information

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18 City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2017/18 Part I Course Overview Course Title: Internet Security and E-Commerce Protocols Course Code: CS4286

More information

Chapter 3: Hashing. Prof Bill Buchanan OBE

Chapter 3: Hashing. Prof Bill Buchanan OBE Chapter 3: Hashing Hashing Types. Hashing Methods. Salting. Collisions. LM and NTLM Hashes (Windows). Hash Benchmarks. Message Authentication Codes (MACs). OTP/HOTP. Prof Bill Buchanan OBE http://asecuritysite.com/crypto03

More information

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce

More information

Recent Developments in Career and Technical Education. New York State Education Department November 2016

Recent Developments in Career and Technical Education. New York State Education Department November 2016 Recent Developments in Career and Technical Education New York State Education Department November 2016 Topics Graduation Pathways- CTE and CDOS CTE Teacher Certification CTE and ESSA Graduation Pathways

More information

Programme Specification (Master s Level)

Programme Specification (Master s Level) Programme Specification (Master s Level) MSc Computing (Software Engineering) This document provides a definitive record of the main features of the programme and the learning outcomes that a typical student

More information

Programme name Computer Science with Cyber Security

Programme name Computer Science with Cyber Security PROGRAMME SPECIFICATION KEY FACTS Programme name Computer Science with Cyber Security Award MSci (Hons) School School of Mathematics, Computer Science and Engineering Department or equivalent Department

More information

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Purdue University Global 208-209 Catalog BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help you

More information

Bachelor of Information Technology (Course Code: C2000) Bachelor of Computer Science (Course Code: C2001)

Bachelor of Information Technology (Course Code: C2000) Bachelor of Computer Science (Course Code: C2001) Bachelor of Information Technology (Course Code: C2000) Bachelor of Computer Science (Course Code: C2001) Monash College Enrolment Information 1 2019 Faculty of Information Technology Academic and Student

More information

Network Security

Network Security 44-555 Network Security Instructor: Scott Bell Office: 2220 Colden Hall Email: sbell@nwmissouri.edu Phone: (660) 562-1699 Description: An introduction to the fundamentals of network security, including

More information

Name of chapter & details.

Name of chapter & details. Course Title Course Code Information Security IT707 Theory : 03 Course Credit Practical : 01 Tutorial : 00 Course Learning Outcomes Credits : 04 On the completion of the course, students will be able to:

More information

Networking Infrastructure

Networking Infrastructure Unit 43: Networking Infrastructure Unit code: A/601/1964 QCF Level 5: BTEC Higher National Credit Value 15 Aim To provide learners with an understanding of networking infrastructures, the directory based

More information

SYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0901 SEMESTER: COURSE TITLE: Operating System Security (Windows 2008 Server) COURSE NUMBER: CIST-0254 CREDIT HOURS: 4 INSTRUCTOR: OFFICE LOCATION: OFFICE

More information

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE Instructor: Prof Aftab Ahmad Office: NB 612 Telephone No. (212)393-6314 Email Address: aahmad@jjay.cuny.edu Office Hours: By appointment TEXT & REFERENCE MATERIAL Text Notes from instructor posted on Blackboard

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year

More information

How to add value and increase income with Vendors resources

How to add value and increase income with Vendors resources The Fifth International Workshop on Learning Methodologies and Platforms used in the Cisco Networking Academy LMPCNA 2013 March 24-29, 2013 - Lisbon, Portugal How to add value and increase income with

More information

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018 Course Outline 09 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant & JAWS Compatible

More information

All LJMU programmes are delivered and assessed in English

All LJMU programmes are delivered and assessed in English PROGRAMME SPECIFICATION Master of Science in Computer Forensics Awarding institution Teaching institution JACS Code Programme Duration Language of Programme Subject benchmark statement Programme accredited

More information

Advanced Crypto. Author: Prof Bill Buchanan

Advanced Crypto.  Author: Prof Bill Buchanan Advanced Crypto Bob Alice Ciphers and Fundamentals. Public key, private key and key exchange. Hashing and Authentication. Digital Certificates and Signing. Disk Encryption, Encryption Cracking and Encryption

More information

CIBTAC LEVEL 4 DIPLOMA IN SPA AND SALON MANAGEMENT CBD11 QAN 600/3328/9. Qualification Specification

CIBTAC LEVEL 4 DIPLOMA IN SPA AND SALON MANAGEMENT CBD11 QAN 600/3328/9. Qualification Specification CIBTAC LEVEL 4 DIPLOMA IN SPA AND SALON MANAGEMENT CBD11 QAN 600/3328/9 Qualification Specification CONTENTS CONTENTS... 2 1. CIBTAC... 3 2. Introduction to CIBTAC qualifications... 3 3. Level of the CIBTAC

More information

MSc in Information Systems

MSc in Information Systems MSc in Information Systems Assoc Prof Dion Goh Programme Director WKWSCI 26 October 2018 Programme Objective To educate information systems professionals who are able to develop and manage user-centered

More information

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

ח'/סיון/תשע א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms Public Key Cryptography Kurose & Ross, Chapters 8.28.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) AddisonWesley, April 2009. Copyright 19962010,

More information

Helping shape your future

Helping shape your future www.pwc.com/pwcacademyme Helping shape your future Project Management Professional (PMP ) PwC s Academy 2016-2017 Contents Welcome to PwC s Academy 1 About Project Management Professional (PMP ) 2 Getting

More information

This programme is only offered at: Kazan State University for Architecture and Engineering (KSUAE)

This programme is only offered at: Kazan State University for Architecture and Engineering (KSUAE) UNIVERSITY OF EAST LONDON UNDERGRADUATE PROGRAMME SPECIFICATION BSc (Hons) Information Systems (Building & Architecture) This programme is only offered at: Kazan State University for Architecture and Engineering

More information

1.264 Lecture 28. Cryptography: Asymmetric keys

1.264 Lecture 28. Cryptography: Asymmetric keys 1.264 Lecture 28 Cryptography: Asymmetric keys Next class: Anderson chapters 20. Exercise due before class (Reading doesn t cover same topics as lecture) 1 Asymmetric or public key encryption Receiver

More information

ASTON UNIVERSITY PROGRAMME SPECIFICATION

ASTON UNIVERSITY PROGRAMME SPECIFICATION ASTON UNIVERSITY PROGRAMME SPECIFICATION Programme Title UCAS/JACS School/Subject Area Final Award Interim Awards Mode(s) of Study Normal Length of Programme Total Credits Programme Accredited By Dates

More information

Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) Version 3.0 (2007/2008)

Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) Version 3.0 (2007/2008) Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) Version 3.0 (2007/2008) 1. Course Codes 3. School/Institute Mathematical & Computer Sciences (University

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

Course Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to:

Course Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to: Title (Units): COMP 7330 Information Systems Security & Auditing (3,3,0) Course Aims: Prerequisite: To introduce the fundamental concepts and techniques in computer and network security, giving students

More information

SYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0901 SEMESTER: COURSE TITLE: Advanced System Manager (Windows 2008 Network) COURSE NUMBER: CIST-0218 CREDIT HOURS: 4 INSTRUCTOR: OFFICE LOCATION: OFFICE

More information

Academic Program Review Cyber Security College of Southern Nevada 2017

Academic Program Review Cyber Security College of Southern Nevada 2017 Academic Program Review Cyber Security College of Southern Nevada 2017 ACADEMIC EVALUATION WORKSHEET PROGRAM ASSESSMENT DATA Date Submitted: Submitted by: Margaret Taylor PROGRAM Assessment Data to be

More information

SECTION 4: OUTCOME MEASURE 6 Multiple Documents: Initial Level: TExES State Content Exam Data Chart

SECTION 4: OUTCOME MEASURE 6 Multiple Documents: Initial Level: TExES State Content Exam Data Chart SECTION 4: OUTCOME MEASURE 6 Multiple Documents: Initial Level: TExES Content Exam 2016-2017 Data Chart Initial Level: TExES Pedagogy and Professional Responsibilities Standards Exam 2016-2017 Data Chart

More information

City University of Hong Kong Course Syllabus. offered by College/School/Department of Electronic Engineering with effect from Semester B in 2017/2018

City University of Hong Kong Course Syllabus. offered by College/School/Department of Electronic Engineering with effect from Semester B in 2017/2018 City University of Hong Kong Course Syllabus offered by College/School/Department of Electronic Engineering with effect from Semester B in 2017/2018 Part I Course Overview Course Title: Cloud Computing

More information

ITT Technical Institute. TB143 Introduction to Personal Computers Onsite and Online Course SYLLABUS

ITT Technical Institute. TB143 Introduction to Personal Computers Onsite and Online Course SYLLABUS ITT Technical Institute TB143 Onsite and Online Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): None. Course Description:

More information

Cryptographic Systems

Cryptographic Systems CPSC 426/526 Cryptographic Systems Ennan Zhai Computer Science Department Yale University Recall: Lec-10 In lec-10, we learned: - Consistency models - Two-phase commit - Consensus - Paxos Lecture Roadmap

More information

Progression from this unit could be to J0HB 34 Penetration Testing to test the effectiveness of the firewall and its configuration.

Progression from this unit could be to J0HB 34 Penetration Testing to test the effectiveness of the firewall and its configuration. Higher National Unit Specification General information Unit code: J0SA 34 Superclass: CB Publication date: June 2018 Source: Scottish Qualifications Authority Version: 01 Unit purpose The purpose of this

More information

School of Computing and Mathematics. Integrated Master s MComp Computer Science. Programme Specification

School of Computing and Mathematics. Integrated Master s MComp Computer Science. Programme Specification School of Computing and Mathematics Integrated Master s MComp Computer Science Programme Specification Information for students: the programme specification is the definitive document summarising the structure

More information

Educator Learning Journeys. Tracy Immel Global Director Teacher Professional Development Programs & Certification

Educator Learning Journeys. Tracy Immel Global Director Teacher Professional Development Programs & Certification Educator Learning Journeys Tracy Immel timmel@microsoft.com Global Director Teacher Professional Development Programs & Certification A Partnership Approach to Education Reform Set Vision and Define Priorities

More information